Know your adversary: exploring the 5 most widely employed tactics in identity theft crimes

Hacker
(Image credit: Pixabay)

To steal your identity, cybercriminals rely on catching you off guard. Even a momentary lapse of attention could result in you giving away the necessary information without realizing it.

Identity theft is a scam that thrives on taking advantage of people when they least expect it. Cybercriminals employ various tactics to steal your identity and access to your bank account. While the best identity theft protection can help, here are five of the most common identity theft techniques you should know.

1. Phishing

Phishing emails and text messages can trick you into revealing your personal information. Scammers create fake websites of banks, credit card companies, PayPal, and eBay by copying their logos and designs. They then send you an urgent and genuine-looking message asking you to fill in a form with your details. If you fall for it, you give away your data without realizing it.

To avoid phishing scams, be cautious of any message that asks for your personal information. Don't click on any links in emails or messages that claim to be from your bank, PayPal, or any other financial institution. Instead, open a new browser window and log in to your account to verify the details of the message. Be on the lookout for grammatical, spelling, and formatting issues, which are tell-tale signs of a phishing attempt.

Someone putting their card into an ATM.

(Image credit: Pixabay)

2. Skimming

Cybercriminals don't need to physically steal your credit card anymore. They use technology to clone its details. Once they get this information, they can use it to create a duplicate card or use it at the checkout of an online store.

But how is this possible? These days, criminals use lightweight machines that can fit in your palm to clone your card. They read the data from the black strip, which is then used to make a copy. This technique has even spread to ATMs and fuel station forecourts.

To prevent skimming, always keep your card in your hand and avoid handing it over to others. Whenever possible, use contactless payments. Finally, before using an ATM, make sure to check for false facias and skimmers.

3. Social media

Social media exposes you to cybercriminals as it leaks certain information about you. Facebook is a prime example of a platform where your hometown, family, job, and spending habits can be found.

Public profiles, posts, and tags leave you vulnerable to identity theft, as anyone can find out your personal information, including places you've been, your residence, your acquaintances, and your date of birth.

Facebook has recently taken measures to enhance user privacy, but, probably, you are not using these settings correctly. To check your privacy settings, review your last Facebook post. If there is a globe icon next to the date, it implies that your post is public.

To protect your social media accounts, secure your account settings, ensuring that all information, photos, and posts can be seen only by friends. Use the "Settings > Privacy" option for Facebook to make the necessary changes. Alternatively, you may consider reducing your friend list or deleting your account.

4. Shoulder surfing

Scammers can use traditional methods to steal your credit card details instead of relying on technology. One such method is "shoulder surfing," where they observe what PINs people enter into ATMs and stores. To do this, they need to get very close to the target or "mark." After all, they are looking over your shoulder!

The perpetrator must have keen eyesight to spot the digits used in your PIN. However, simply memorizing the PIN number is not enough for identity theft.

Understandably, shoulder surfing often leads to more advanced scams, such as skimming or even old-fashioned pickpocketing. Once criminals have both your card and PIN, they hold the advantage.

To prevent shoulder surfing, make sure you cover the keypad when entering your PIN at an ATM or cashier desk.

A skyline overlaid with numerous icons denoting the cloud, data, Wi-Fi, and other parts of daily digital life.

(Image credit: Shutterstock / metamorworks)

5. Unsecure networks

Despite the advancements in wireless security, unsecured networks still exist. For instance, if you are using an old router at home, it might not provide a secure WPA2 connection, and instead, you might be stuck with a vulnerable WEP connection. Similarly, your local coffee shop, library, shopping center, or even a football ground could be providing incorrectly configured Wi-Fi networks, thereby risking your online privacy. 

There are various risks associated with using unsecured Wi-Fi networks, such as unsecured routers with publicly accessible backdoors that allow your data to be intercepted and read. Additionally, scammers set up fake Wi-Fi networks to trick you into sending your data via their devices. 

To ensure your online privacy, it is essential to make networks secure. Upgrade your router to provide a secure connection if it's your network. If you're using a public Wi-Fi network, always use a VPN to protect your data from being intercepted.

Awareness is the key to combating identity theft 

It is possible that you have come across some of the methods used for identity theft. However, you might not have thought that you could be a victim of them. This is because you may believe that you do not have much money in your bank account. Unfortunately, the truth is that it is easier to steal from ordinary people than from celebrities, football players, or wealthy individuals. Therefore, it is essential to be aware of phishing, skimming, shoulder surfing, and the risks of using unsecured networks. Additionally, it is advisable to avoid sharing too much information on social media.

More from TechRadar Pro

Christian Cawley

Christian Cawley has extensive experience as a writer and editor in consumer electronics, IT and entertainment media. He has contributed to TechRadar since 2017 and has been published in Computer Weekly, Linux Format, ComputerActive, and other publications. Formerly the editor responsible for Linux, Security, Programming, and DIY at MakeUseOf.com, Christian previously worked as a desktop and software support specialist in the public and private sectors.

Read more
An illustration of a hooded hacker with an obscured face holding a large fingerprint against a red background.
ID theft – what happens when someone steals your identity
Google Pixel Scam Detection warning
Common internet scams and how to avoid them
Hands typing on a keyboard surrounded by security icons
Outdated ID verification myths put businesses at risk
Cartoon illustration of multiple smartphones
Are you oversharing? These are the 10 pieces of information you don't want to give away – ranked
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
Paper craft illustration of a suspicious email that contains a snake
How to spot a phishing email
Latest in Security
Data leak
Hacked Tata Technologies data leaked by ransomware gang
China
Chinese hackers targeting Juniper Networks routers, so patch now
Google Chrome dark mode
Google updates Chrome extension rules to ban affiliate link injection without user action or benefit
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Avast cybersecurity
UK cybersecurity sector could be worth £13bn, research shows
An option to add Ambient Music buttons to the iOS 18.4 Control Center.
Apple fixes dangerous zero-day used in attacks against iPhones and iPads
Latest in News
UK Prime Minister Sir Kier Starmer
UK PM says AI should soon replace civil servants
Eight Samsung TVs mounted to the wall showing different basketball games
Samsung is offering you 8 new TVs in one bundle for March Madness, in case you want to watch all games at once like a Bond villain’s lair
The Steam Logo on a mobile phone in front of a wall of games.
Today’s Steam Spring Sale features my absolute favorite game of all time - here's when the sale starts and all the key info
Apple iPhone 16 Pro Max REVIEW
The latest iPhone 17 Pro Max leak may have given us another look at its upcoming redesign
Half-Life running on a smartwatch
This Redditor installed a game engine on their smartwatch, and now it runs Doom, Quake, and Half-Life
Samsung Galaxy Z Fold 6
The Samsung Galaxy Z Fold 7 could be in line for a Galaxy S25 Ultra-level camera upgrade